A set of infrastructure-as-code examples to help those getting started with DevOps tools
☆17Sep 26, 2024Updated last year
Alternatives and similar repositories for devops-workstream
Users that are interested in devops-workstream are comparing it to the libraries listed below
Sorting:
- A curated list of amazingly awesome OSINT☆19Oct 7, 2025Updated 5 months ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- AWS Security Checks☆40Jan 18, 2018Updated 8 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- ☆10Jun 27, 2020Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- ☆27Mar 1, 2017Updated 9 years ago
- English translation of @vulhub - Docker-Compose files for creating vulnerable environments. THIS PROJECT HAS BEEN ADDED WITH THE OFFICAL …☆11Sep 5, 2018Updated 7 years ago
- Site for the podcast.☆14Apr 24, 2020Updated 5 years ago
- Database to store previously found subdomains☆66Sep 22, 2025Updated 5 months ago
- Driver utilities for building static analysis and other command-line tools.☆23Nov 28, 2022Updated 3 years ago
- Data from my Sunday streams☆75Jul 28, 2019Updated 6 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆63Jul 22, 2019Updated 6 years ago
- Async / concurrent HTTP requests for Go☆50Jun 29, 2023Updated 2 years ago
- Work in progress rust bindings to ggml☆12May 1, 2023Updated 2 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Helper for reproducible random tests with Jest, Vitest and ChanceJS☆12Mar 5, 2026Updated 2 weeks ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- Estimating programming tasks using neural networks☆10Jun 29, 2018Updated 7 years ago
- View and tail files of any size in the Atom editor. Great for logs.☆11Aug 30, 2015Updated 10 years ago
- Export a JSON archive of a Gitter room's messages☆15Sep 26, 2018Updated 7 years ago
- A stream processing library for F#☆39Jan 5, 2016Updated 10 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- A tool to find sensitive keys and passwords in Travis logs☆139Jun 27, 2021Updated 4 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- CVE-2018-2893☆13Oct 7, 2018Updated 7 years ago
- Examples of using common Python profiling techniques☆12May 24, 2019Updated 6 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- ☆16Jan 5, 2023Updated 3 years ago
- Javascript Implementations of SplayTrees, Fusion Trees, BTrees, etc.☆11Dec 19, 2011Updated 14 years ago
- The zsh framework made to facilitate management, not dictate it.☆16Apr 28, 2020Updated 5 years ago
- Python tool to check for expired domains still allowed in crossdomain.xml files☆13Jan 11, 2017Updated 9 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago